Skip to content

Commit

Permalink
formatting
Browse files Browse the repository at this point in the history
  • Loading branch information
calvinmetcalf committed Mar 9, 2015
1 parent 3f10450 commit 07a8727
Show file tree
Hide file tree
Showing 3 changed files with 13 additions and 14 deletions.
2 changes: 1 addition & 1 deletion curves.js
Original file line number Diff line number Diff line change
Expand Up @@ -5,4 +5,4 @@ exports['1.3.132.0.33'] = 'p224'

exports['1.2.840.10045.3.1.1'] = 'p192'

exports['1.2.840.10045.3.1.7'] = 'p256'
exports['1.2.840.10045.3.1.7'] = 'p256'
21 changes: 10 additions & 11 deletions test/index.js
Original file line number Diff line number Diff line change
Expand Up @@ -339,13 +339,13 @@ test('kvector works', function (t) {
})

test('reject invalid sigs', function (t) {
var message = 'a valid message!';
var message = 'a valid message!'
var hash = Buffer.concat([
new Buffer('302d300d06096086480165030402040500041c', 'hex'),
crypto.createHash('sha224').update(message).digest()
])
t.test('I create a valid sig', function (t) {
t.plan(2);
t.plan(2)
var priv = parseKeys(rsa1024.private)
var len = priv.modulus.byteLength()
var pad = [ 0, 1 ]
Expand All @@ -365,7 +365,7 @@ test('reject invalid sigs', function (t) {
t.ok(myCrypto.createVerify('RSA-SHA224').update(message).verify(rsa1024.public, sign), 'I accept it')
})
t.test('invalid leading byte', function (t) {
t.plan(2);
t.plan(2)
var priv = parseKeys(rsa1024.private)
var len = priv.modulus.byteLength()
var pad = [ 0, 2 ]
Expand All @@ -385,8 +385,8 @@ test('reject invalid sigs', function (t) {
t.notOk(myCrypto.createVerify('RSA-SHA224').update(message).verify(rsa1024.public, sign), 'I reject it')
})

t.test('invalid ending bytes', function (t) {
t.plan(2);
t.test('invalid ending bytes', function (t) {
t.plan(2)
var priv = parseKeys(rsa1024.private)
var len = priv.modulus.byteLength()
var pad = [ 0, 1 ]
Expand All @@ -407,7 +407,7 @@ test('reject invalid sigs', function (t) {
})

t.test('missing f', function (t) {
t.plan(2);
t.plan(2)
var priv = parseKeys(rsa1024.private)
var len = priv.modulus.byteLength()
var pad = [ 0, 1 ]
Expand All @@ -428,7 +428,7 @@ test('reject invalid sigs', function (t) {
})

t.test('missing f, extra data', function (t) {
t.plan(2);
t.plan(2)
var priv = parseKeys(rsa1024.private)
var len = priv.modulus.byteLength()
var pad = [ 0, 1 ]
Expand All @@ -449,16 +449,16 @@ test('reject invalid sigs', function (t) {
})

t.test('in suficent fs', function (t) {
t.plan(2);
t.plan(2)
var priv = parseKeys(rsa1024.private)
var len = priv.modulus.byteLength()
var pad = [ 0, 1 ]
var i = 7;
var i = 7
while (i--) {
pad.push(0xff)
}
pad.push(0x00)
var i = -1
i = -1
while (++i < hash.length) {
pad.push(hash[i])
}
Expand All @@ -469,5 +469,4 @@ test('reject invalid sigs', function (t) {
.verify(rsa1024.public, sign), 'node rejects it')
t.notOk(myCrypto.createVerify('RSA-SHA224').update(message).verify(rsa1024.public, sign), 'I reject it')
})

})
4 changes: 2 additions & 2 deletions verify.js
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ function verify (sig, hash, key) {

sig = new Buffer(sig.fromRed().toArray())
var out = 0
if (padNum<8) {
if (padNum < 8) {
out = 1
}
len = Math.min(sig.length, pad.length)
Expand Down Expand Up @@ -86,4 +86,4 @@ function checkValue (b, q) {
if (b.cmp(q) >= q) {
throw new Error('invalid sig')
}
}
}

0 comments on commit 07a8727

Please sign in to comment.